共查询到20条相似文献,搜索用时 0 毫秒
1.
2.
In this study interviews were used to discover the effect of four variables on police image: race, sex, age, and type of communication with policemen. It was found that white subjects, subjects who reported that their images of police were based on personal contact, and subjects who reported no arrest record had significantly more favorable images of police than did their counterparts. 相似文献
3.
de Fuentes Jose M. Gonzalez-Manzano Lorena Lopez Javier Peris-Lopez Pedro Choo Kim-Kwang Raymond 《Mobile Networks and Applications》2019,24(3):878-880
Mobile Networks and Applications - 相似文献
4.
Consumer Acceptance of RFID Technology: An Exploratory Study 总被引:1,自引:0,他引:1
Radio frequency identification (RFID) technology is used in numerous applications and offers a plethora of interesting potential new applications. However, this potential raises issues that require addressing to achieve its widespread acceptance by consumers. This paper investigates the factors that affect consumer acceptance of RFID technology. The purpose of this effort is to develop and test a theoretical model that contextualizes the technology acceptance model (TAM) within the context of RFID technology. The research model proposes that convenience, culture, privacy, regulation, and security are the principal factors influencing the consumerspsila acceptance of RFID. However, the results show that convenience, culture, and security are significant predictors. This study is the first in the RFID literature to use the TAM for explaining consumer acceptance of RFID technology. The findings suggest that: (1) higher perceived convenience of RFID technology leads to greater acceptance of this technology; (2) societal beliefs, value systems, norms, and/or behaviors influence the extent of consumer acceptance of RFID technology; and (3) higher perceived importance of and less willingness to sacrifice personal information security lead to lower intention to use RFID technology. Contextualization of TAM to RFID technology makes this study relevant to practitioners because the results can provide insight to organizations using or exploring the use of RFID technology. 相似文献
5.
6.
7.
E-business success factors are Important for traditional enterprises to implement e-business. This topic is attracting more and more researchers to study. This paper makes an exploratory study on the factors influencing e-business success. Firstly, based on the literature review, 52 factors are suggested. Secondly, two rounds of survey with Delphi method are conducted. Qualitative and quantitative analysis are used to identify 57 factors. This is the foundation of empirical study. 相似文献
8.
互联网时代新职位首席隐私官 总被引:1,自引:0,他引:1
浪文 《信息安全与通信保密》2001,(5)
包括Excite@Home公司、Providian金融公司和AT&T公司在内的几十家美国企业,最近都设立了一种新的管理职位--首席隐私官(CPO),专门负责处理同用户隐私权相关事宜,CPO直接对企业的最高领导人负责。 相似文献
9.
基于多智能体的网络信息系统的原理与实现 总被引:2,自引:0,他引:2
本文针对目前单Agent系统的一些缺点,提出采用多Agent技术实现搜索引擎的功能.系统具有计算效率高、可靠性强、可扩充性好、强健壮性、软件可复用性好的优点.并对系统要解决的主要问题:MAS的组织和结构、精确的形式化、通讯、协作问题,进行了详细说明. 相似文献
10.
Privacy and authentication: An introduction to cryptography 总被引:8,自引:0,他引:8
This paper presents a tutorial introduction to contemporary cryptography. The basic information theoretic and computational properties of classical and modern cryptographic systems are presented, followed by cryptanalytic examination of several important systems and an examination of the application of cryptography to the security of timesharing systems and computer networks. The paper concludes with a guide to the cryptographic literature. 相似文献
11.
近年来,随着智能终端在全球市场的成功推出,移动互联网的普及与应用得到了快速发展,并已成为日常生活中的重要组成部分,个人隐私泄露与保护问题也日益凸显。因此,亟需建立以身份管理为核心的信息网络基础设施,用于规范个人信息管理、提升政府的监管能力、促进ICT网络的融合与发展。本文从移动互联网面临的用户隐私信息保护问题入手,介绍了移动互联网中身份管理产业推进的情况,提出了身份管理作为信息网络重要基础设施的应对建议以及下一步的研究建议。 相似文献
12.
当前法学教育对学生驾驭法律信息资源能力培养在不同程度上缺失,学生使用的检索方法单一,弊端显明。随着现代信息技术的飞速发展,掌握利用计算机网络获取法律信息资源的方法已经成为提升学生法律职业能力的重要手段和途径。 相似文献
13.
《Engineering Management, IEEE Transactions on》2006,53(3):440-455
This paper explores the factors influencing perceptions of data warehousing process maturity. Data warehousing, like software development, is a process, which can be expressed in terms of components such as artifacts and workflows. In software engineering, the Capability Maturity Model (CMM) was developed to define different levels of software process maturity. We draw upon the concepts underlying CMM to define different maturity levels for a data warehousing process (DWP). Based on the literature in software development and maturity, we identify a set of features for characterizing the levels of data warehousing process maturity and conduct an exploratory field study to empirically examine if those indeed are factors influencing perceptions of maturity. Our focus in this paper is on managerial perceptions of DWP. The results of this exploratory study indicate that several factors—data quality, alignment of architecture, change management, organizational readiness, and data warehouse size—have an impact on DWP maturity, as perceived by IT professionals. From a practical standpoint, the results provide useful pointers, both managerial and technological, to organizations aspiring to elevate their data warehousing processes to more mature levels. This paper also opens up several areas for future research, including instrument development for assessing DWP maturity. 相似文献
14.
Web浏览器本地隐私信息通常包含用户保存的各类网站的用户名密码信息,通过一些恶意技术可以窃取用户计算机里所包含的各类用户名密码信息。由于浏览器本身认为系统用户是可信的,因此容易导致用户的用户名密码信息遭到窃取,并且难以防范。首先着重讲解了Web浏览器用户名密码等隐私信息存储方式,接着对获取敏感信息的常用方法做了工程上的实现,最后提出了几种保护浏览器敏感信息的思路和改进方法。 相似文献
15.
16.
信息安全保密的严峻态势和对策 总被引:1,自引:2,他引:1
曲成义 《信息安全与通信保密》2010,(9)
要想准确分析目前信息安全保密的态势,就需要对国际上的信息安全动态进行深入的分析.以美国为例,奥巴马就职后,2009年5月决定成立网络战争司令部,2010年5月网络战争司令部正式起动,增补了3000多名网络特种部队、上万名网军.网络战争司令部的使命就是态势感知、系统威胁和网络交战. 相似文献
17.
《Engineering Management, IEEE Transactions on》2008,55(3):442-454
18.
李卫 《微电子学与计算机》1998,15(1):22-26
随着Internet和Intranet的发展,越来越多的信息服务器被广泛使用,如何方便有效地管理这些信息服务器也变得非常迫切。本文在一般的网络管理系统和SNMP协议的基础上提出了一种共享SNMPAGENT的模式,与网络管理系统相结合,可以集成地管理不同的信息服务器。 相似文献
19.
自美国提出“信息高速公路”的构想之后,Internet的发展格外引人注目。近年来Internet发展更为迅速,并从非赢利性的专用计算机网全面走向商用。此外美国另一个大型信息网正在崛起,与Internet一起共同成为实现“信息高速公路”的基础。 相似文献
20.
胡晓荷 《信息安全与通信保密》2010,(8):18-19
随着中国信息化建设的快速推进与发展,涉密信息越来越多地以电子文档形式呈现在计算机、移动存储介质等电子载体中。对电子文档的违规操作,文档一旦被删除、格式化,或重新安装操作系统,将很难追查。保密检查工作面临着重大难题。而计算机取证技术的引入及发展和应用,解决了这些难题,大大提升了保密检查工作的有效性和威慑力。 相似文献